Kerberos Security - IBM AIX HACMP SG24-5131-00 Hardware User Manual

Certification study guide
Table of Contents

Advertisement

After that, identify the HACWS event scripts to HACMP by executing the
/usr/sbin/hacws/spcw_addevents
command, and verify the configuration with the
/usr/sbin/hacws/hacws_verify
command. You should also check the cabling from the backup cws with the
/usr/sbin/hacws/spcw_verify_cabling
command. Then reboot the primary and the backup cws, one after the other,
and start cluster services on the primary cws with
services is up and running, check that control workstation services, such as
SDRGetObjects
services on the backup cws as well. Check for the completion of the cluster
services startup with the following command:
grep "SPCW_APPS COMPLETE" /tmp/hacmp.out
Now you can cause a failover by stopping cluster services on the primary cws
and see whether cws services are still available afterwards.

9.2 Kerberos Security

To understand security, we have to clarify some definitions first.
Identification
Authentication is the process by which the other entity verifies this identity.
Authorization
Additionally, if information is transferred over an insecure network, as any
TCP/IP network basically is, there is always a chance that someone is
listening, so some sort of encryption is required.
These issues are solved with kerberos.
, are working as expected. If everything is fine, start up cluster
is the process by which an entity tells another who it is.
is the process performed by an entity to check if an agent,
whose identity has previously been authenticated, has or
does not have the necessary privileges to carry out some
action.
. After cluster
smit clstart
Special RS/6000 SP Topics
187

Advertisement

Table of Contents
loading

This manual is also suitable for:

Aix hacmp

Table of Contents